In the Linux kernel, the following vulnerability has been resolved:
RDMA/rxe: Fix responder length checking for UD request packets
According to the IBA specification:
If a UD request packet is detected with an invalid length, the request
shall be an invalid request and it shall be silently dropped by
the responder. The responder then waits for a new request packet.
commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking")
defers responder length check for UD QPs in function `copy_data`.
But it introduces a regression issue for UD QPs.
When the packet size is too large to fit in the receive buffer.
`copy_data` will return error code -EINVAL. Then `send_data_in`
will return RESPST_ERR_MALFORMED_WQE. UD QP will transfer into
ERROR state.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-07-12T12:37:35.800Z
Updated: 2024-11-05T09:34:39.217Z
Reserved: 2024-07-12T12:17:45.605Z
Link: CVE-2024-40992
Vulnrichment
Updated: 2024-08-02T04:39:56.166Z
NVD
Status : Awaiting Analysis
Published: 2024-07-12T13:15:20.497
Modified: 2024-07-12T16:34:58.687
Link: CVE-2024-40992
Redhat